Securing Network Infrastructure :: Discover Practical Network Security with Nmap and Nessus 7.
Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization.
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing Ltd,
2019.
|
Schriftenreihe: | Learning path
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization. |
Beschreibung: | Chapter 6: Report Analysis and Confirmation |
Beschreibung: | 1 online resource (526 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 1838646973 9781838646974 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1096227035 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 190406s2019 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d TEFOD |d UKAHL |d TEFOD |d OCLCF |d OCLCQ |d N$T |d OCLCQ |d NLW |d OCLCO |d UKMGB |d OCLCO |d NZAUC |d OCLCQ |d OCLCO |d OCLCL |d TMA |d OCLCQ | ||
015 | |a GBC221631 |2 bnb | ||
016 | 7 | |a 019365498 |2 Uk | |
020 | |a 1838646973 | ||
020 | |a 9781838646974 |q (electronic bk.) | ||
020 | |z 9781838642303 |q print | ||
035 | |a (OCoLC)1096227035 | ||
037 | |a 9436B5DE-A846-4143-8029-D373B7595B28 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 005.8 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Jetty, Sairam. | |
245 | 1 | 0 | |a Securing Network Infrastructure : |b Discover Practical Network Security with Nmap and Nessus 7. |
260 | |a Birmingham : |b Packt Publishing Ltd, |c 2019. | ||
300 | |a 1 online resource (526 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 0 | |a Learning path | |
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Network Vulnerability Scanning; Basic networks and their components; Network Vulnerability Scanning; Flow of procedures; Discovery; Port scanning; Vulnerability scanning; Uses; Complexity; Scope of the scan; Network architecture; Network access; Response; Summary; Chapter 2: Understanding Network Scanning Tools; Introducing Nessus and Nmap; Useful features of Nessus; Policies; Plugin Rules; Customized Reports; Scanners; Various features of Nmap; Host discovery | |
505 | 8 | |a Scan techniquesPort specification and scan order; Service or version detection; Script scan; OS detection; Timing and performance; Evasion and spoofing; Output; Target specification; Installing and activating Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Downloading and installing Nmap; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Updating Nessus; Getting ready; How to do it ... ; There's more ... ; Updating Nmap; Getting ready; How to do it ... ; Removing Nessus; Getting ready; How to do it ... ; There's more ... ; Removing Nmap; How to do it ... ; There's more ... | |
505 | 8 | |a Chapter 3: Port ScanningIntroduction; How to specify a target; Getting ready; How do it ... ; How it works ... ; How to perform host discovery; How do it ... ; How it works ... ; How to identify open ports; How do it ... ; How it works ... ; How to manage specification and scan order; How do it ... ; How it works ... ; How to perform a script and version scan; How do it ... ; How it works ... ; How to detect operating system; How do it ... ; How it works ... ; How to detect and bypass network protection systems; How do it ... ; How it works ... ; How to use Zenmap; How do it ... ; How it works ... ; Chapter 4: Vulnerability Scanning; Introduction | |
505 | 8 | |a How to manage Nessus policiesGetting ready; How to do it ... ; How it works ... ; How to manage Nessus settings; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus user accounts; Getting ready; How to do it ... ; How it works ... ; How to choose a Nessus scan template and policy; Getting ready; How to do it ... ; How it works ... ; How to perform a vulnerability scan using Nessus; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus scans; Getting ready; How to do it ... ; How it works ... ; Chapter 5: Configuration Audits; Introducing compliance scans | |
505 | 8 | |a Selecting a compliance scan policyPlugins; Synopsis; Description; Solution; Plugin information; Risk information; Vulnerability information; Reference information; Compliance standards; Getting ready; How do it ... ; How it works ... ; Introducing configuration audits; Database audit; Network device audit; Operating system audit; Application audit; Performing an operating system audit; Getting ready; How do it ... ; How it works ... ; Performing a database audit; Getting ready; How do it ... ; How it works ... ; Performing a web application scan; Getting ready; How do it ... ; How it works ... | |
500 | |a Chapter 6: Report Analysis and Confirmation | ||
520 | |a Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization. | ||
504 | |a Includes bibliographical references. | ||
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a Computer security. |2 bicssc | |
650 | 7 | |a Computer viruses, Trojans & worms. |2 bicssc | |
650 | 7 | |a Network security. |2 bicssc | |
650 | 7 | |a Computers |x Security |x Viruses. |2 bisacsh | |
650 | 7 | |a Computers |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computers |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Rahalkar, Sagar. | |
758 | |i has work: |a Securing network infrastructure (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGpmr9V6gyrpxRK4Wptjhb |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Jetty, Sairam. |t Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7. |d Birmingham : Packt Publishing Ltd, ©2019 |z 9781838642303 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2092869 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH36142894 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5742610 | ||
938 | |a EBSCOhost |b EBSC |n 2092869 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1096227035 |
---|---|
_version_ | 1816882489417793536 |
adam_text | |
any_adam_object | |
author | Jetty, Sairam |
author2 | Rahalkar, Sagar |
author2_role | |
author2_variant | s r sr |
author_facet | Jetty, Sairam Rahalkar, Sagar |
author_role | |
author_sort | Jetty, Sairam |
author_variant | s j sj |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Network Vulnerability Scanning; Basic networks and their components; Network Vulnerability Scanning; Flow of procedures; Discovery; Port scanning; Vulnerability scanning; Uses; Complexity; Scope of the scan; Network architecture; Network access; Response; Summary; Chapter 2: Understanding Network Scanning Tools; Introducing Nessus and Nmap; Useful features of Nessus; Policies; Plugin Rules; Customized Reports; Scanners; Various features of Nmap; Host discovery Scan techniquesPort specification and scan order; Service or version detection; Script scan; OS detection; Timing and performance; Evasion and spoofing; Output; Target specification; Installing and activating Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Downloading and installing Nmap; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Updating Nessus; Getting ready; How to do it ... ; There's more ... ; Updating Nmap; Getting ready; How to do it ... ; Removing Nessus; Getting ready; How to do it ... ; There's more ... ; Removing Nmap; How to do it ... ; There's more ... Chapter 3: Port ScanningIntroduction; How to specify a target; Getting ready; How do it ... ; How it works ... ; How to perform host discovery; How do it ... ; How it works ... ; How to identify open ports; How do it ... ; How it works ... ; How to manage specification and scan order; How do it ... ; How it works ... ; How to perform a script and version scan; How do it ... ; How it works ... ; How to detect operating system; How do it ... ; How it works ... ; How to detect and bypass network protection systems; How do it ... ; How it works ... ; How to use Zenmap; How do it ... ; How it works ... ; Chapter 4: Vulnerability Scanning; Introduction How to manage Nessus policiesGetting ready; How to do it ... ; How it works ... ; How to manage Nessus settings; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus user accounts; Getting ready; How to do it ... ; How it works ... ; How to choose a Nessus scan template and policy; Getting ready; How to do it ... ; How it works ... ; How to perform a vulnerability scan using Nessus; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus scans; Getting ready; How to do it ... ; How it works ... ; Chapter 5: Configuration Audits; Introducing compliance scans Selecting a compliance scan policyPlugins; Synopsis; Description; Solution; Plugin information; Risk information; Vulnerability information; Reference information; Compliance standards; Getting ready; How do it ... ; How it works ... ; Introducing configuration audits; Database audit; Network device audit; Operating system audit; Application audit; Performing an operating system audit; Getting ready; How do it ... ; How it works ... ; Performing a database audit; Getting ready; How do it ... ; How it works ... ; Performing a web application scan; Getting ready; How do it ... ; How it works ... |
ctrlnum | (OCoLC)1096227035 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05943cam a2200649 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1096227035</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">190406s2019 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">TEFOD</subfield><subfield code="d">UKAHL</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NZAUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC221631</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019365498</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1838646973</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838646974</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781838642303</subfield><subfield code="q">print</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1096227035</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9436B5DE-A846-4143-8029-D373B7595B28</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jetty, Sairam.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing Network Infrastructure :</subfield><subfield code="b">Discover Practical Network Security with Nmap and Nessus 7.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing Ltd,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (526 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Learning path</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Network Vulnerability Scanning; Basic networks and their components; Network Vulnerability Scanning; Flow of procedures; Discovery; Port scanning; Vulnerability scanning; Uses; Complexity; Scope of the scan; Network architecture; Network access; Response; Summary; Chapter 2: Understanding Network Scanning Tools; Introducing Nessus and Nmap; Useful features of Nessus; Policies; Plugin Rules; Customized Reports; Scanners; Various features of Nmap; Host discovery</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Scan techniquesPort specification and scan order; Service or version detection; Script scan; OS detection; Timing and performance; Evasion and spoofing; Output; Target specification; Installing and activating Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Downloading and installing Nmap; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Updating Nessus; Getting ready; How to do it ... ; There's more ... ; Updating Nmap; Getting ready; How to do it ... ; Removing Nessus; Getting ready; How to do it ... ; There's more ... ; Removing Nmap; How to do it ... ; There's more ...</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 3: Port ScanningIntroduction; How to specify a target; Getting ready; How do it ... ; How it works ... ; How to perform host discovery; How do it ... ; How it works ... ; How to identify open ports; How do it ... ; How it works ... ; How to manage specification and scan order; How do it ... ; How it works ... ; How to perform a script and version scan; How do it ... ; How it works ... ; How to detect operating system; How do it ... ; How it works ... ; How to detect and bypass network protection systems; How do it ... ; How it works ... ; How to use Zenmap; How do it ... ; How it works ... ; Chapter 4: Vulnerability Scanning; Introduction</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">How to manage Nessus policiesGetting ready; How to do it ... ; How it works ... ; How to manage Nessus settings; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus user accounts; Getting ready; How to do it ... ; How it works ... ; How to choose a Nessus scan template and policy; Getting ready; How to do it ... ; How it works ... ; How to perform a vulnerability scan using Nessus; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus scans; Getting ready; How to do it ... ; How it works ... ; Chapter 5: Configuration Audits; Introducing compliance scans</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Selecting a compliance scan policyPlugins; Synopsis; Description; Solution; Plugin information; Risk information; Vulnerability information; Reference information; Compliance standards; Getting ready; How do it ... ; How it works ... ; Introducing configuration audits; Database audit; Network device audit; Operating system audit; Application audit; Performing an operating system audit; Getting ready; How do it ... ; How it works ... ; Performing a database audit; Getting ready; How do it ... ; How it works ... ; Performing a web application scan; Getting ready; How do it ... ; How it works ...</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 6: Report Analysis and Confirmation</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses, Trojans & worms.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Network security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Security</subfield><subfield code="x">Viruses.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rahalkar, Sagar.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Securing network infrastructure (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGpmr9V6gyrpxRK4Wptjhb</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Jetty, Sairam.</subfield><subfield code="t">Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7.</subfield><subfield code="d">Birmingham : Packt Publishing Ltd, ©2019</subfield><subfield code="z">9781838642303</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2092869</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36142894</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5742610</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2092869</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1096227035 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:25Z |
institution | BVB |
isbn | 1838646973 9781838646974 |
language | English |
oclc_num | 1096227035 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (526 pages) |
psigel | ZDB-4-EBA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing Ltd, |
record_format | marc |
series2 | Learning path |
spelling | Jetty, Sairam. Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7. Birmingham : Packt Publishing Ltd, 2019. 1 online resource (526 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Learning path Print version record. Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Network Vulnerability Scanning; Basic networks and their components; Network Vulnerability Scanning; Flow of procedures; Discovery; Port scanning; Vulnerability scanning; Uses; Complexity; Scope of the scan; Network architecture; Network access; Response; Summary; Chapter 2: Understanding Network Scanning Tools; Introducing Nessus and Nmap; Useful features of Nessus; Policies; Plugin Rules; Customized Reports; Scanners; Various features of Nmap; Host discovery Scan techniquesPort specification and scan order; Service or version detection; Script scan; OS detection; Timing and performance; Evasion and spoofing; Output; Target specification; Installing and activating Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Downloading and installing Nmap; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Updating Nessus; Getting ready; How to do it ... ; There's more ... ; Updating Nmap; Getting ready; How to do it ... ; Removing Nessus; Getting ready; How to do it ... ; There's more ... ; Removing Nmap; How to do it ... ; There's more ... Chapter 3: Port ScanningIntroduction; How to specify a target; Getting ready; How do it ... ; How it works ... ; How to perform host discovery; How do it ... ; How it works ... ; How to identify open ports; How do it ... ; How it works ... ; How to manage specification and scan order; How do it ... ; How it works ... ; How to perform a script and version scan; How do it ... ; How it works ... ; How to detect operating system; How do it ... ; How it works ... ; How to detect and bypass network protection systems; How do it ... ; How it works ... ; How to use Zenmap; How do it ... ; How it works ... ; Chapter 4: Vulnerability Scanning; Introduction How to manage Nessus policiesGetting ready; How to do it ... ; How it works ... ; How to manage Nessus settings; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus user accounts; Getting ready; How to do it ... ; How it works ... ; How to choose a Nessus scan template and policy; Getting ready; How to do it ... ; How it works ... ; How to perform a vulnerability scan using Nessus; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus scans; Getting ready; How to do it ... ; How it works ... ; Chapter 5: Configuration Audits; Introducing compliance scans Selecting a compliance scan policyPlugins; Synopsis; Description; Solution; Plugin information; Risk information; Vulnerability information; Reference information; Compliance standards; Getting ready; How do it ... ; How it works ... ; Introducing configuration audits; Database audit; Network device audit; Operating system audit; Application audit; Performing an operating system audit; Getting ready; How do it ... ; How it works ... ; Performing a database audit; Getting ready; How do it ... ; How it works ... ; Performing a web application scan; Getting ready; How do it ... ; How it works ... Chapter 6: Report Analysis and Confirmation Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization. Includes bibliographical references. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Sécurité informatique. Computer security. bicssc Computer viruses, Trojans & worms. bicssc Network security. bicssc Computers Security Viruses. bisacsh Computers Security General. bisacsh Computers Networking Security. bisacsh Computer security fast Rahalkar, Sagar. has work: Securing network infrastructure (Text) https://id.oclc.org/worldcat/entity/E39PCGpmr9V6gyrpxRK4Wptjhb https://id.oclc.org/worldcat/ontology/hasWork Print version: Jetty, Sairam. Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7. Birmingham : Packt Publishing Ltd, ©2019 9781838642303 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2092869 Volltext |
spellingShingle | Jetty, Sairam Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7. Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Network Vulnerability Scanning; Basic networks and their components; Network Vulnerability Scanning; Flow of procedures; Discovery; Port scanning; Vulnerability scanning; Uses; Complexity; Scope of the scan; Network architecture; Network access; Response; Summary; Chapter 2: Understanding Network Scanning Tools; Introducing Nessus and Nmap; Useful features of Nessus; Policies; Plugin Rules; Customized Reports; Scanners; Various features of Nmap; Host discovery Scan techniquesPort specification and scan order; Service or version detection; Script scan; OS detection; Timing and performance; Evasion and spoofing; Output; Target specification; Installing and activating Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Downloading and installing Nmap; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Updating Nessus; Getting ready; How to do it ... ; There's more ... ; Updating Nmap; Getting ready; How to do it ... ; Removing Nessus; Getting ready; How to do it ... ; There's more ... ; Removing Nmap; How to do it ... ; There's more ... Chapter 3: Port ScanningIntroduction; How to specify a target; Getting ready; How do it ... ; How it works ... ; How to perform host discovery; How do it ... ; How it works ... ; How to identify open ports; How do it ... ; How it works ... ; How to manage specification and scan order; How do it ... ; How it works ... ; How to perform a script and version scan; How do it ... ; How it works ... ; How to detect operating system; How do it ... ; How it works ... ; How to detect and bypass network protection systems; How do it ... ; How it works ... ; How to use Zenmap; How do it ... ; How it works ... ; Chapter 4: Vulnerability Scanning; Introduction How to manage Nessus policiesGetting ready; How to do it ... ; How it works ... ; How to manage Nessus settings; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus user accounts; Getting ready; How to do it ... ; How it works ... ; How to choose a Nessus scan template and policy; Getting ready; How to do it ... ; How it works ... ; How to perform a vulnerability scan using Nessus; Getting ready; How to do it ... ; How it works ... ; How to manage Nessus scans; Getting ready; How to do it ... ; How it works ... ; Chapter 5: Configuration Audits; Introducing compliance scans Selecting a compliance scan policyPlugins; Synopsis; Description; Solution; Plugin information; Risk information; Vulnerability information; Reference information; Compliance standards; Getting ready; How do it ... ; How it works ... ; Introducing configuration audits; Database audit; Network device audit; Operating system audit; Application audit; Performing an operating system audit; Getting ready; How do it ... ; How it works ... ; Performing a database audit; Getting ready; How do it ... ; How it works ... ; Performing a web application scan; Getting ready; How do it ... ; How it works ... Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Sécurité informatique. Computer security. bicssc Computer viruses, Trojans & worms. bicssc Network security. bicssc Computers Security Viruses. bisacsh Computers Security General. bisacsh Computers Networking Security. bisacsh Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 |
title | Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7. |
title_auth | Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7. |
title_exact_search | Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7. |
title_full | Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7. |
title_fullStr | Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7. |
title_full_unstemmed | Securing Network Infrastructure : Discover Practical Network Security with Nmap and Nessus 7. |
title_short | Securing Network Infrastructure : |
title_sort | securing network infrastructure discover practical network security with nmap and nessus 7 |
title_sub | Discover Practical Network Security with Nmap and Nessus 7. |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Sécurité informatique. Computer security. bicssc Computer viruses, Trojans & worms. bicssc Network security. bicssc Computers Security Viruses. bisacsh Computers Security General. bisacsh Computers Networking Security. bisacsh Computer security fast |
topic_facet | Computer security. Sécurité informatique. Computer viruses, Trojans & worms. Network security. Computers Security Viruses. Computers Security General. Computers Networking Security. Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2092869 |
work_keys_str_mv | AT jettysairam securingnetworkinfrastructurediscoverpracticalnetworksecuritywithnmapandnessus7 AT rahalkarsagar securingnetworkinfrastructurediscoverpracticalnetworksecuritywithnmapandnessus7 |